Authenticated secret key generation in delay-constrained wireless systems

被引:0
|
作者
Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
机构
[1] School of CSEE,
[2] University of Essex,undefined
[3] ETIS UMR8051,undefined
[4] CY University,undefined
[5] ENSEA,undefined
[6] CNRS,undefined
关键词
Physical layer security; Secret key generation; Physical unclonable functions; Resumption protocols; Effective capacity; QoS; Wireless communications; 5G applications;
D O I
暂无
中图分类号
学科分类号
摘要
With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
引用
收藏
相关论文
共 50 条
  • [31] Delay-constrained Achievable Rate Maximization in Wireless Relay Networks with Causal Feedback
    Li, James C. F.
    Dey, Subhrakanti
    2008 IEEE 9TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, 2008, : 456 - 460
  • [32] Optimal rate control for delay-constrained data transmission over a wireless channel
    Zafer, Murtaza
    Modiano, Eytan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) : 4020 - 4039
  • [33] Broadcasting Delay-Constrained Traffic Over Unreliable Wireless Links With Network Coding
    Hou, I-Hong
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (03) : 728 - 740
  • [34] Optimum Multicast Scheduling in Delay-Constrained Content-Centric Wireless Networks
    Nath, Samrat
    Wu, Jingxian
    Lin, Hai
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [35] Cross-layer resource allocation for delay-constrained wireless video transmission
    Scaglione, A
    van der Schaar, M
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 909 - 912
  • [36] A Delay-Constrained and Maximum Lifetime Data Gathering Algorithm for Wireless Sensor Networks
    Liang, Junbin
    Wang, Jianxin
    Chen, Jianer
    2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, : 148 - 155
  • [37] Delay-constrained energy-efficient wireless packet scheduling with QoS guarantees
    Zhong, XL
    Xu, CZ
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 3336 - 3340
  • [38] Delay-constrained energy-efficient routing in heterogeneous wireless sensor networks
    Yang, Yinying
    Cardei, Mihaela
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 7 (04) : 236 - 247
  • [39] Message Delivery Capacity in Delay-Constrained Mobile Wireless Networks: Bounds and Realization
    Keung, Gabriel Y.
    Li, Bo
    Zhang, Qian
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [40] Delay-constrained energy efficient data transmission over a wireless fading channel
    Zafer, Murtaza
    Modiano, Eytan
    2007 INFORMATION THEORY AND APPLICATIONS WORKSHOP, 2007, : 287 - +